Sciweavers

5284 search results - page 879 / 1057
» Sampling search-engine results
Sort
View
JIB
2007
95views more  JIB 2007»
15 years 4 months ago
Integration of constraints documented in SBML, SBO, and the SBML Manual facilitates validation of biological models
The creation of quantitative, simulatable, Systems Biology Markup Language (SBML) models that accurately simulate the system under study is a time-intensive manual process that re...
Allyson L. Lister, Matthew R. Pocock, Anil Wipat
TPDS
2008
178views more  TPDS 2008»
15 years 4 months ago
On-Demand Medium Access in Multihop Wireless Networks with Multiple Beam Smart Antennas
The paper presents a detailed discussion of various issues involved in designing a medium access control (MAC) protocol for multihop wireless networks with nodes employing multiple...
Vivek Jain, Anurag Gupta, Dharma P. Agrawal
CGF
2005
111views more  CGF 2005»
15 years 4 months ago
Temporally Coherent Irradiance Caching for High Quality Animation Rendering
In rendering of high quality animations that include global illumination, the final gathering and irradiance caching are considered standard procedures. However, the computational...
Miloslaw Smyk, Shin-ichi Kinuwaki, Roman Durikovic...
JMLR
2007
104views more  JMLR 2007»
15 years 4 months ago
Learnability of Gaussians with Flexible Variances
Gaussian kernels with flexible variances provide a rich family of Mercer kernels for learning algorithms. We show that the union of the unit balls of reproducing kernel Hilbert s...
Yiming Ying, Ding-Xuan Zhou
TSMC
2008
172views more  TSMC 2008»
15 years 4 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank